Trusted by millions of Kenyans
Study resources on Kenyaplex

Get ready-made curriculum aligned revision materials

Exam papers, notes, holiday assignments and topical questions – all aligned to the Kenyan curriculum.

Describe how auditing software can detect unauthorised access and modification of data.

Describe how auditing software can detect unauthorised access and modification of data.

Answers


Lydia
An audit trail/log is maintained
It records which user has logged on
... at which terminal/workstation/node
... the log on/off times
... the data/files they accessed/modified

lydiajane74 answered the question on July 1, 2018 at 14:33

Answer Attachments

Exams With Marking Schemes

Related Questions